Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/twig/twig@3.11.2 |
| Type | composer |
| Namespace | twig |
| Name | twig |
| Version | 3.11.2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 3.14.1 |
| Latest_non_vulnerable_version | 3.19.0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-1au7-86r7-8qdn |
| vulnerability_id |
VCID-1au7-86r7-8qdn |
| summary |
Twig has unguarded calls to `__toString()` when nesting an object into an array
### Description
In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance).
### Resolution
The sandbox mode now checks the `__toString()` method call on all objects.
The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/cafc608ece310e62a35a76f17e25c04ab9ed05cc) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/d4a302681bca9f7c6ce2835470d53609cdf3e23e) for the 3.x branch.
### Credits
We would like to thank Jamie Schouten for reporting the issue and Fabien Potencier for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33244 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33165 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33201 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33224 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33184 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33207 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33167 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33211 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33248 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51754 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/twigphp/Twig |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/twigphp/Twig |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-51754, GHSA-6377-hfv9-hqf6
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1au7-86r7-8qdn |
|
| 1 |
| url |
VCID-cd24-q2ys-yfbe |
| vulnerability_id |
VCID-cd24-q2ys-yfbe |
| summary |
Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled
### Description
In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy.
They are now checked via the property policy and the `__isset()` method is now called after the security check.
**This is a BC break.**
### Resolution
The sandbox mode now ensures access to array-like's properties is allowed.
The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/ec39a9dccc5fb4eaaba55e5d79a6f84a8dd8b69d) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/b957e5a44cc0075d04ccff52f8fa9d8e6db3e3a0) for the 3.x branch.
### Credits
We would like to thank Jamie Schouten for reporting the issue and Nicolas Grekas for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51755 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35079 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35141 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35104 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35128 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35163 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35159 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35133 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35208 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51755 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/twigphp/Twig |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/twigphp/Twig |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-51755, GHSA-jjxq-ff2g-95vh
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cd24-q2ys-yfbe |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.11.2 |